Cybersecurity threats are not new; however, they have gained momentum as the intensity and volume of attacks has increased in recent years. A mix of sophisticated old threats and new zero-day attacks have given rise to the need for new cyber security techniques.

In order to formulate effective cyber security strategies, it is important to understand different types of rising security threats:

Insecure API: API refers to Application Programing & User Interface. When an organization sources a cloud service from a service provider, the interface is not used by a single client. It is shared by numerous other users; thus, the organization cannot control the security of interface. As a client, organizations should make sure that the service provider incorporates stringent security measures starting from authentication to encryption.

Direct Data Center & Cloud Attacks: The cyber attackers launch these attacks by locating vulnerabilities in applications and exploiting them to enter a cloud network. Generally exploited vulnerabilities are insecure passwords and lack of proper authentication. Once the cyber attackers gain access, they can move across the applications & data centers freely. Such attacks are not easily spotted by the compromised organizations.

Crypto-jacking: As cryptocurrency is gaining popularity, cryptocurrency attacks are also rising. Crypto-jacking is the term used for unauthentic use of someone’s computer for mining cryptocurrency. The crypto mining code is either encrypted in a link which is sent to the victim via a phishing e-mail or it is loaded in an infectious online ad or website. Once the user clicks on the link, the code is installed on his computer. However, in case of infected ad or website, the code is not loaded on victim’s computer. As the website or ad pops up in victim’s browser, the code is auto-executed. Unlike ransomware, crypto mining code does not harm user’s personal data but uses CPU resources which results in slow processing.

Advanced Persistent Threat (APT): In APT, the hacker breaches a network but stays undetected for a long time; thus, increasing his dwelling period instead of asking for instant ransom. The main motive is to steal information or security data unobtrusively. The breach could be caused by using malware, exploit kits or by piggybacking on legitimate traffic. Once breached, the attackers could steal login credentials to move across the network easily.

IoT Attacks: IoT now includes laptops, tablets, routers, webcams, smart watches, wearable devices, automobiles, home electronics, etc. As IoT is becoming more ubiquitous and number of connected devices is increasing, cyber criminals are targeting the IoT networks for cyber invasions & infections. Once they gain access to a network, cyber criminals can program the devices to create chaos, lock down essential devices for financial ransom, overload the network, etc.

The term End Point Detection & Response (EDR) was first coined by Anton Chuvakin in July 2013. It is used to define ‘the tools that are primarily focused on detecting and investigating suspicious activities (and traces of such) other problems on hosts/endpoints’.

EDR works by collecting data related to endpoint events using a software. This data is sent to a centralized database where further analysis, investigation & reporting is conducted by analytical tools. These tools pay heed to both internal as well as external threats. They respond to these threats while identifying the upgrades required for strengthening the organization’s cyber security. The traditional EDR tools have been successful in creating visibility and remediation of stealthy threats. However, the cybercrimes have evolved and this has led to a need for better and evolved EDR tools.

Following are some gaps between traditional EDR and modern threats that have given birth to the need for next-generation solutions:

EDR requires cloud connectivity and an analyst has to wait for cloud response to take action. This results in a delay in protecting end devices. However, the cyber threats no longer target a single user and are capable of spreading over the entire organization, encrypting data and removing traces of attack in mere seconds.

The attackers make use of tools already available on a computer to incorporate scripts that run directly in the memory. These in-memory file-less attacks do not leave behind a trail and may not be detected by traditional EDR tools.

To provide visibility, EDR creates a high amount of data and analysis; thus, these solutions are not scalable and require extensive resources like bandwidth, skilled workforce, etc.

EDR does not provide visibility into lateral network. If a threat makes its way into organizational network, it can move through connected devices and covertly communicate with a remote control server without being detected or interrupted.

In the world of ever developing cyber threats, it has become important to make a shift towards next generation EDR solutions that make use of artificial intelligence to detect threats in real time. It is advisable to use a collaboration of various security solutions to create a multi-layer cyber security shield. New EDR solutions offer wider features:

Detect and prevent hidden exploits that are more complex than a simple hash signature.

Scareware is a malicious software that tricks the users and directs them to a malware infested website. It usually comes up in the form of a pop-up and appears as a legitimate warning from an antivirus company. The pop up displays the information that users must purchase the software to fix the problem. Scareware creates a perception of threat and manipulates users to buy a fake software. The fake software could be a spyware which collects user’s personal data for further gains.

How Is It Conducted?

Step 1: A pop-up appears on the website with a note that a virus has been found in the system and a software needs to be downloaded in order to get rid of it.Step 2: Once the user clicks on the download button, a scareware attack is launched & a malware is installed on the user’s system.Step 3: The cyber-criminal gains access to the victim’s private data and exploits it for his benefit.

Ways In Which Scareware Can Infect The System

Through a greeting, lottery or news alert email

Advertizements

Pop-ups with a message like- scan your system or a virus has been detected in you system

Affected websites that take advantage of software vulnerabilities

What Can A Scareware Attack Do?

Trick you to pay money for a fake antivirus software

Control your device and use it for sending spam

Access your confidential bank details and record your keystrokes

Ways To Protect Yourself From A Scareware Attack

Typically, a scareware gets into your system though a pop-up. You can minimize the risk of scareware by turning on the pop-up blocker.

It is always advisable to use the latest version of the browser; so make sure that your browser is regularly updated for any security patches.

Make sure that you install a reputed antivirus software on your system and also keep it updated.

Restart the computer if your system is responding slowly or you come across something unusual.

Prefer reading emails in plain text.

Never open emails sent from unknown sources.

Do not click on any link on an unsecured webpage. Chances are that the warning pop-up is a malicious link that will install virus in to your system.

Never allow the browser to save your login details and passwords.

In order to protect yourself from such cyber-attacks, it is important to understand how they operate. Also, be wary of clicking on any pop-up while browsing.

LeakerLocker is a ransomware that affects mobile devices running on android platform. Unlike other mobile ransomwares that encrypt user data, LeakerLocker Ransomware doesn’t encrypt your data but locks your screen. Cybercriminals claim that the user’s private & confidential information will be transferred to their secure cloud and sent to the victim’s phone contacts if he fails to pay a ransom amount.

The mobile malware research team at McAfee identified the LeakerLocker ransomware on July 7, 2017. It was spotted that the ransomware was spreading via two apps:

Wallpapers Blur HD

Booster & Cleaner Pro

The apps function like any legitimate app; however once installed, a malicious code is loaded via a command-and-control server. When the access permission is granted, the code collects sensitive data from the user’s phone and blackmails him against it.

What Type Of Data Is Collected?

Personal photos

Contact numbers

Sent and received SMS

Phone call history

Facebook messages

Chrome history

Full email texts

GPS location history

How To Protect Your Device From LeakerLocker Ransomware?

Install An Antivirus Software: Protect your phone from any ransomware attack by installing a reputed antivirus software. These software scan the websites as well as apps to ensure that they are safe and do not contain any type of malware.

Update Your Phone: Make sure that you check your phone for android system updates available and download them regularly.

Back-up Your Files: It is important to back-up your files regularly to recover them in case of any data loss. You can back-up the information to the cloud or store your data on an external hard drive.

Don’t Download Apps From Unknown Sources: Whenever you download an app, make sure that you download it from a trusted source. Avoid downloading third party apps as they may pose a security threat. Also change your system settings and disable them to perform unofficial app installations.

Ignore Pop-Up Installations: Be wary of pop-up installations and avoid installing an update or plug-in.

Know Before Clicking On A Link: Make sure that you do not click on any links which you receive via an email or text from an unknown source.

Check The App Reviews: Read the reviews before downloading any app and also ensure that it is from a reputable developer. Do not download the app if you find something suspicious in the comments

For more information about ransomware attacks and ways to protect yourself from them, call the team of Centex Technologies at (254) 213-4740.

Enter Your Email To Get Posts Sent Directly To You

Social Networks

Author

Abdul Subhani

I am the President & CEO of
Centex Technologies Microsoft Small Business Specialist, Certified E-Commerce Consultant, Certified Ethical Hacker, Certified Fraud Examiner, Virtual Instructor and an IT Consultant/Speaker on IT Security, Networking, Small Business Architect, & SEO Internet Marketing.

Certifications

Links

Twitter posts

We've been nominated for Small Business of the Year, Best I.T. Company, Young Entrepreneur of the Year, and CEO of the Year. Register and search for myself or Centex Technologies. It will only take you 5 minutes and I would greatly…lnkd.in/eqhaUXplnkd.in/erfAizd